mandatoryprogrammer / CursedChrome
Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.
☆1,516Updated 5 months ago
Alternatives and similar repositories for CursedChrome:
Users that are interested in CursedChrome are comparing it to the libraries listed below
- Mimikatz implementation in pure Python☆2,977Updated last month
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,352Updated 4 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,085Updated 3 years ago
- A collaborative, multi-platform, red teaming framework☆3,515Updated last week
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,752Updated 2 years ago
- pwning IPv4 via IPv6☆1,768Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆2,417Updated last year
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,335Updated 8 months ago
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆969Updated 4 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,795Updated last year
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,188Updated last month
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,225Updated 5 months ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,234Updated last year
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,728Updated 2 weeks ago
- Connect like there is no firewall. Securely.☆1,652Updated this week
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,836Updated 2 years ago
- Data exfiltration over DNS request covert channel☆860Updated 11 months ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,501Updated 5 months ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,716Updated 2 months ago
- DNS Enumeration Script☆2,733Updated this week
- Windows Exploit Suggester - Next Generation☆4,358Updated last week
- A mostly-serverless distributed hash cracking platform☆805Updated 11 months ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,231Updated 7 months ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,808Updated last year
- AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation☆1,999Updated last year
- File upload vulnerability scanner and exploitation tool.☆3,181Updated last year
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆1,889Updated 3 weeks ago
- A swiss army knife for pentesting networks☆8,643Updated last year
- The ultimate WinRM shell for hacking/pentesting☆4,775Updated 3 months ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆3,029Updated 7 months ago